clinical-meteor / hipaa-policies
HIPAA Policies and Procedures for Clinical Meteor Apps.
☆12Updated 8 years ago
Alternatives and similar repositories for hipaa-policies:
Users that are interested in hipaa-policies are comparing it to the libraries listed below
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- S3Insights is a platform for efficiently deriving security insights about S3 data through metadata analysis☆12Updated 2 weeks ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- ☆14Updated last year
- notes on configuring aws organizations☆11Updated 8 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated last year
- basic proxy as an azure function serverless app☆18Updated 2 years ago
- ZAP scripts to implement ASVS L1 checking☆15Updated 2 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- Tools to automate AWS Cloud security assessments☆23Updated 5 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆11Updated last year
- In addition to providing a solution to create and manage custom security controls and frameworks this repository provide an integration o…☆9Updated last year
- ☆11Updated 3 years ago
- GCP Audit checks projects in Google Cloud for compliance with CIS Benchmarks☆21Updated 3 weeks ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Updated 4 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 3 years ago
- ☆11Updated 8 years ago
- Threat Mitigation Strategies☆25Updated last year
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- Create machine images containing the Nessus vulnerability scanner☆12Updated this week
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 4 years ago
- AWS Powershell scripts to make management of AWS accounts easier☆10Updated 5 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Cloud Security Tools☆16Updated 4 years ago